-
1
-
-
84982889010
-
-
Blakley, B., http://www.bhs.org/IT/Projects/cpr/security/CORBASEC-FAQ/, Section 4.3.2, April 1998.
-
(1998)
-
-
Blakley, B.1
-
3
-
-
84982926978
-
-
Proc. Distributed Applications and Interoperable Systems DAIS'97, Chapman & Hall
-
Brose, G.: JacORB — design and implementation of a Java ORB. Proc. Distributed Applications and Interoperable Systems DAIS'97, Chapman & Hall (1997) 143-154 http://www.inf.fu-berlin.de/"brose/jacorb/
-
(1997)
Jacorb — Design and Implementation of a Java ORB
, pp. 143-154
-
-
Brose, G.1
-
5
-
-
0003593599
-
-
draft-ietf-spki-cert-theory-02.txt
-
Ellison, C, Prantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. Internet Draft, draft-ietf-spki-cert-theory-02.txt (1998)
-
(1998)
SPKI Certificate Theory. Internet Draft
-
-
Ellison, C.1
Prantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
6
-
-
0024664205
-
A secure identity-based capability system. Proc
-
Gong, L.: A secure identity-based capability system. Proc. IEEE Symposium on Security and Privacy (1989) 156-83
-
(1989)
IEEE Symposium on Security and Privacy
, pp. 156-183
-
-
Gong, L.1
-
7
-
-
0010032891
-
Computational issues in secure interoperation
-
Gong, L., Qian, X.: Computational issues in secure interoperation. IEEE Transactions on Software Engineering, Vol. 22(1), January 1996, 43-52
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 43-52
-
-
Gong, L.1
Qian, X.2
-
8
-
-
84982942343
-
-
Proc. ECOOP '97 Workshop, CORBA: Implementation, Use and Evaluation
-
Hagimont, D., Huet, O., Mossiere, J.: A protection scheme for a CORBA environment. Proc. ECOOP '97 Workshop, CORBA: Implementation, Use and Evaluation (1997)
-
(1997)
A Protection Scheme for a CORBA Environment.
-
-
Hagimont, D.1
Huet, O.2
Mossiere, J.3
-
11
-
-
0017971337
-
A language extension for expressing constraints on data access
-
Jones, A., Liskov, B.: A language extension for expressing constraints on data access. Communications of the ACM, Vol. 21(5), May 1978, 358-367
-
(1978)
Communications of the ACM
, vol.21
, Issue.5
, pp. 358-367
-
-
Jones, A.1
Liskov, B.2
-
12
-
-
84958746535
-
Authorization in CORBA Security. Proc. ESORICS'98, LNCS 1485
-
Karjoth, G.: Authorization in CORBA Security. Proc. ESORICS'98, LNCS 1485, Springer (1998) 143-158
-
(1998)
Springer
, pp. 143-158
-
-
Karjoth, G.1
-
18
-
-
0026119329
-
A model of authorization for nextgeneration database systems
-
Rabitti, F., Bertino, E., Kim, W., Woelk, D.: A model of authorization for nextgeneration database systems. ACM Transactions on Database Systems, Vol. 16(1), March 1991, 88-131
-
(1991)
ACM Transactions on Database Systems
, vol.16
, Issue.1
, pp. 88-131
-
-
Rabitti, F.1
Bertino, E.2
Kim, W.3
Woelk, D.4
-
19
-
-
84976656319
-
-
Proc. OOPSLA
-
Richcirdson, J., Schwarz, P., Cabrera, L.-F.: CACL: Efficient fine-grained protection for objects, Proc. OOPSLA 1992, 263-275
-
(1992)
CACL: Efficient Fine-Grained Protection for Objects
, pp. 263-275
-
-
Richcirdson, J.1
Schwarz, P.2
Cabrera, L.-F.3
-
20
-
-
84968397157
-
Updatable views in object-oriented databases
-
Scholl, M., Laasch, C, Tresch, M.: Updatable views in object-oriented databases. Proc. 2. Int. Conf. on Deductive and Object-Oriented Databases, LNCS 566, Springer (1991) 189-207
-
(1991)
Proc. 2. Int. Conf. on Deductive and Object-Oriented Databases
, pp. 189-207
-
-
Scholl, M.1
Laasch, C.2
Tresch, M.3
|